Enhancing Email Security Against Phishing Attacks Through User Behavior Analysis and Data Loss Prevention (DLP)

Authors

DOI:

10.29303/jppipa.v11i4.10781

Published:

2025-04-25

Issue:

Vol. 11 No. 4 (2025): April

Keywords:

Attacks, Data Loss Prevention (DLP), Email, Phishing, Security, User behavior

Research Articles

Downloads

How to Cite

Yasmin, T. S., & Yulianto, T. (2025). Enhancing Email Security Against Phishing Attacks Through User Behavior Analysis and Data Loss Prevention (DLP). Jurnal Penelitian Pendidikan IPA, 11(4), 590–600. https://doi.org/10.29303/jppipa.v11i4.10781

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Abstract

This study was conducted and aimed to improve email security against phishing attacks through user behavior analysis and data loss prevention (DLP). Phishing attacks pose a significant threat to the protection of user information and privacy, especially for individuals who are less aware of phishing emails. Their vulnerability to such attacks not only compromises their own security but also poses a great risk to the company. This can result in huge financial losses. Thus, there is an urgent need to improve security measures for users and systems. This study will use the NIST Cybersecurity Framework 2.0. This framework provides a structured approach to identifying and analyzing user behavior. Then an assessment of the phishing simulation is carried out to pay attention to users who are vulnerable to phishing attacks. After assessing the phishing email, the DLP configuration is determined for preventive measures. The following are the core functions of CSF as a framework that will be used: Based on the phishing simulation conducted, the pattern is almost the same, displaying the sender's email domain that is very similar to the original. Employees are usually easily trapped if they do not read the domain carefully and immediately follow the instructions in the email body. Phishing emails typically have a business context and are assumed to be sent by a trusted person, such as a supervisor, a colleague from the same department, or a different department. User behavior analysis is key to identifying vulnerabilities to phishing attacks. Understanding how users interact with emails can help develop effective mitigation strategies. Implementing DLP as a layer of defense can proactively detect and prevent phishing emails from reaching users’ inboxes. Proper DLP configuration is critical to a successful implementation. User education and training are critical components to raising awareness of phishing threats. Equipping users with the skills to recognize and avoid phishing attacks can significantly reduce an organization’s vulnerability.

References

Abid, N. (2020). Advancements and Best Practices in Data Loss Prevention: A Comprehensive Review. Global Journal of Universal Studies, 1(1), 190–225. Retrieved from https://media.neliti.com/media/publications/590136-advancements-and-best-practices-in-data-a5521663.pdf

Adeyeri, A., & Abroshan, H. (2024). Geopolitical Ramifications of Cybersecurity Threats: State Responses and International Cooperations in the Digital Warfare Era. Information, 15(11), 682. https://doi.org/10.3390/info15110682

Ahmed, M. N., Mahmood, H., & Iqbal, Z. (2023). A Novel Framework for Email’s Data Leak Prevention Through Semantic Analysis. 2023 International Conference on It and Industrial Technologies (ICIT), 1–6. https://doi.org/10.1109/icit59216.2023.10335896

Alsharnouby, M., Alaca, F., & Chiasson, S. (2015). Why Phishing Still Works: User Strategies for Combating Phishing Attacks. International Journal of Human Computer Studies, 82, 69-82. https://doi.org/10.1016/j.ijhcs.2015.05.005

Aziz, F., Mayasari, N., Sabhan, S., Zulkifli, Z., & Yasin, M. F. (2022). The Future of Human Rights in the Digital Age: Indonesian Perspectives and Challenges. Journal of Digital Law and Policy, 2(1), 29–40. https://doi.org/10.58982/jdlp.v2i1.292

Beyer, J. L. (2023). The Politics of Cybersecurity and the Global Internet. Perspectives on Politics, 21(2), 664–668. https://doi.org/10.1017/s1537592723000361

Chaganti, R., Varadarajan, V., Gorantla, V. S., Gadekallu, T. R., & Ravi, V. (2022). Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture. Future Internet, 14(9), 1–20. https://doi.org/10.3390/fi14090250

Dawkins, S., & Jacobs, J. (2023). NIST Phish Scale User Guide. Gaithersburg: National Institute of Standards and Technology. https://doi.org/10.6028/NIST.TN.2276

Domnik, J., & Holland, A. (2024). On Data Leakage Prevention Maturity: Adapting The C2m2 Framework. Journal of Cybersecurity and Privacy, 4(2), 167–195. https://doi.org/10.3390/jcp4020009

Emenike, S. U. (2021). Data Loss Prevention in A Remote Work Environment. Retrieved from https://urn.kb.se/resolve?urn=urn%3anbn%3ase%3ahis%3adiva-20203

Firdaus, G. A., Sukowati, P., & Adi, D. S. (2023). Licensing of MSME Business Through Online Single Submission Risk Based Approach. Cross Current International Journal of Economics, Management and Media Studies, 5(02), 11–20. https://doi.org/10.36344/ccijemms.2023.v05i02.001

Hassib, B., & Shires, J. (2024). Digital Recognition: Cybersecurity and Internet Infrastructure in UAE–Israel Diplomacy. International Affairs, 100(6), 2399–2418. https://doi.org/10.1093/ia/iiae233

Montano, I. H., Diaz, J. R., Aranda, J. J. G., Molina-Cardín, S., López, J. J. G., & Díez, I. D. L. T. (2024). Securecipher: An Instantaneous Synchronization Stream Encryption System for Insider Threat Data Leakage Protection. Expert Systems with Applications, 254, 124470. https://doi.org/10.1016/j.eswa.2024.124470

Isaura, E. R., Chen, Y.-C., Su, H.-Y., & Yang, S.-H. (2020). The Relationship between Food Security Status and Sleep Disturbance Among Adults: A Cross-Sectional Study in An Indonesian Population. Nutrients, 12(11), 3411. https://doi.org/10.3390/nu12113411

ISO/IEC. (2018). ISO/IEC 27005: 2018 Information Security Risk Management-Guidelines. 2018. Retrieved from https://www.iso.org/standard/75281.html

Jaeger, L., Eckhardt, A., & Kroenung, J. (2021). The Role of Deterrability for the Effect of Multi-Level Sanctions on Information Security Policy Compliance: Results of a Multigroup Analysis. Information & Management, 58(3), 103318. https://doi.org/10.1177/14624745211068870

Kapoor, M. (2024). Comparative Analysis of AI Algorithms for Enhancing Phishing Detection in Real-Time Email Security. Aitoz Multidisciplinary Review, 3(1), 338–352.

Khan, A. W., Saeed, S., & Kakar, M. S. (2024). Cybersecurity as a Geopolitical Tool: The Growing Influence of Digital Warfare in Statecraft. International Research Journal of Social Sciences and Humanities, 3(2), 345–357. Retrieved from https://irjssh.com/index.php/irjssh/article/view/209

Khanna, A. (2024). Ransomware Prevention. In Securing An Enterprise (Bll 119–138). Apress. https://doi.org/10.1007/979-8-8688-1029-9_7

Kintonova, A., Vasyaev, A., & Shestak, V. (2021). Cyberbullying and Cyber-Mobbing in Developing Countries. Information & Computer Security, 29(3), 435–456. https://doi.org/10.1108/ics-02-2020-0031

Kovaitė, K., Šūmakaris, P., & Stankevičienė, J. (2020). Digital Communication Channels in Industry 4.0 Implementation. Management, 25(1), 171–191. https://doi.org/10.30924/mjcmi.25.1.10

Kulkarni, S., & Girish, G. N. (2024). Navigating The Abyss–Illuminating Data Leakage Threats, Mitigations, and Future Horizons. In Cloud Security (Bll 37–51). Chapman And Hall/Crc.

Leo, M., Sharma, S., & Maddulety, K. (2019). Machine Learning in Banking Risk Management: A Literature Review. Risks, 7(1), 29. https://doi.org/10.3390/risks7010029

Li, H., Ge, D., Liu, S., Zhang, W., Wang, J., Si, J., & Zhai, J. (2019). Baduanjin Exercise for Low Back Pain: A Systematic Review and Meta-Analysis. In Complementary Therapies In Medicine. https://doi.org/10.1016/j.ctim.2019.01.021

Liesnaia, Y., & Malakhov, S. (2023). The Analysis of Development, Typical Objectives and Mechanisms of Phishing Attacks. Computer Science and Cybersecurity, 1, 6–27. https://doi.org/10.26565/2519-2310-2023-1-01

Liu, S., & Kuhn, R. (2010). Data Loss Prevention. It Professional, 12(2), 10–13. https://doi.org/10.1109/mitp.2010.52

Mansikka, J. (2023). Data Loss Prevention: For Securing Enterprise Data Integrity. Retrieved from https://urn.fi/urn:nbn:fi:amk-2023101827711

Marcillo-Delgado, J. C., Alvarez-Garcia, A., & García-Carrillo, A. (2022). Communication Strategies on Risk and Disaster Management in South American Countries. International Journal of Disaster Risk Reduction, 76, 102982. https://doi.org/10.1016/j.ijdrr.2022.102982

Marques, L. (2024). Enhancing Data Breach Prevention Measures in Corporate Setting. Retrieved form https://repository.stcloudstate.edu/msia_etds/144

Moore, J. (2024). Keeping up with the NIST CyberSecurity Framework. Retrieved from https://medium.com/@jefferywmoore/keeping-up-with-the-nist-cybersecurity-framework-3ff9fd983cc9

Nayak, A., Patnaik, A., Satpathy, I., & Patnaik, B. C. M. (2024). Data Storage and Transmission Security in the Cloud. Indian Journal of Cryptography and Network Security, 2(2), 194–212. https://doi.org/10.4018/979-8-3693-1431-9.ch009

Omodara, H. (2022). Cloud Security: A Survey of Information Communication Technology (ICT) and Cybersecurity Professionals’ Perception on Data Loss Prevention (DLP) Measures for Software-as-a-Service (SaaS) Application-Related Data Breaches and Leakage. Retrieved from https://www.academia.edu/88587761/Cloud_Security_A_survey_of_Information_Communication_Technology_ICT_and_Cybersecurity

Omotunde, H., & Ahmed, M. (2023). A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond. Mesopotamian Journal of Cybersecurity, 2023, 115–133. http://dx.doi.org/10.58496/MJCSC/2023/016

Prince, N. U., Faheem, M. A., Khan, O. U., Hossain, K., Alkhayyat, A., Hamdache, A., & Elmouki, I. (2024). AI-Powered Data-Driven Cybersecurity Techniques: Boosting Threat Identification and Reaction. Nanotechnology Perceptions, 20, 332–353.

Saunders, A., Cornett, M. M., & Erhemjamts, O. (2021). Financial Institutions Management: A Risk Management Approach. Mcgraw-Hill.

Senapati, K. K., Kumar, A., & Sinha, K. (2023). Impact of Information Leakage and Conserving Digital Privacy. In Malware Analysis and Intrusion Detection in Cyber-Physical Systems (Bll 166–188). Igi Global. https://doi.org/10.4018/978-1-6684-8666-5.ch008

Shahbaznezhad, H., Kolini, F., & Rashidirad, M. (2021). Employees’ Behavior in Phishing Attacks: What Individual, Organizational, and Technological Factors Matter? Journal of Computer Information Systems, 61(6), 539–550. https://doi.org/10.1080/08874417.2020.1812134

Shishodia, B. S., & Nene, M. J. (2022). Data Leakage Prevention System for Internal Security. 2022 International Conference on Futuristic Technologies (INCOFT), 1–6. https://doi.org/10.1109/incoft55651.2022.10094509

Steves, M., Greene, K., & Theofanos, M. (2020). Categorizing Human Phishing Difficulty: A Phish Scale. Journal of Cybersecurity, 6(1), 1–16. https://doi.org/10.1093/cybsec/tyaa009

Syarova, S., Toleva-Stoimenova, S., Kirkov, A., Petkov, S., & Traykov, K. (2024). Data Leakage Prevention and Detection in Digital Configurations: А Survey. Environment, Technologies, Resources, Proceedings of The International Scientific and Practical Conference, 2, 253–258. https://doi.org/10.17770/etr2024vol2.8045

Vashishth, T. K., Sharma, V., Sharma, K. K., Kumar, B., Chaudhary, S., & Panwar, R. (2024). Enhancing Cloud Security. In Improving Security, Privacy, and Trust in Cloud Computing (Bll 85–112). Igi Global Scientific Publishing. https://doi.org/10.4018/979-8-3693-1431-9.ch004

Wang, C., Cheng, Z., Yue, X.-G., & Mcaleer, M. (2020). Risk Management of Covid-19 by Universities in China. Journal of Risk and Financial Management, 13(2), 36. https://doi.org/10.3390/jrfm13020036

Wendy, W. (2024). The Nexus between Financial Literacy, Risk Perception and Investment Decisions: Evidence from Indonesian Investors. Investment Management & Financial Innovations, 21(3), 135-147. http://dx.doi.org/10.21511/imfi.21(3).2024.12

Wiranata, G. A., Ucuk, Y., Subekti, S., & Sidarta, D. D. (2024). Pertanggungjawaban Pidana Terhadap Pelaku Tindak Pidana Phishing. Court Review: Jurnal Penelitian Hukum (E-Issn: 2776-1916), 4(02), 13–25. https://doi.org/10.69957/cr.v4i02.1503

Yadav, I., & Gupta, H. (2023). Designing Data Loss Prevention System for the Enhancement of Data Integrity in Cyberspace. 2023 5th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), 1361–1365. https://doi.org/10.1109/ICAC3N60023.2023.10541823

Author Biographies

Tamara Sinatrya Yasmin, Swiss German University

Tomi Yulianto, Swiss German University

License

Copyright (c) 2025 Tamara Sinatrya Yasmin, Tomi Yulianto

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Authors who publish with Jurnal Penelitian Pendidikan IPA, agree to the following terms:

  1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution 4.0 International License (CC-BY License). This license allows authors to use all articles, data sets, graphics, and appendices in data mining applications, search engines, web sites, blogs, and other platforms by providing an appropriate reference. The journal allows the author(s) to hold the copyright without restrictions and will retain publishing rights without restrictions.
  2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in Jurnal Penelitian Pendidikan IPA.
  3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).